Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Share Episode ⸺ Episode Sponsor: Incident.io - https://dev0ps.fyi/incidentio Elise, VP and Head of UX at Unleash, joins us to talk all about UX. Self identifying as probably "The annoying lady in the room" and a career spanning nearly 30 years—starting before "UX" was even a job title — joins us to dismantle the idea that User Experience is just ab…
…
continue reading
1
Barrierefreiheit: Das Internet ist für alle da (dgna)
1:17:48
1:17:48
Play later
Play later
Lists
Like
Liked
1:17:48Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deBy OWASP German Chapter
…
continue reading
1
News from the Juice Shop ecosystem (god2025)
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
…
continue reading
1
OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deBy Torsten Gigler
…
continue reading
1
Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)
21:12
21:12
Play later
Play later
Lists
Like
Liked
21:12Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
…
continue reading
1
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
…
continue reading
1
A CISO's Adventures in AI Wonderland (god2025)
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
1
How we hacked Y Combinator companies' AI agents (god2025)
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
…
continue reading
1
"I have no idea how to make it safer": Security and Privacy Mindsets of Browser Extension Developers (god2025)
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
…
continue reading
1
Extract: A PHP Foot-Gun Case Study (god2025)
24:37
24:37
Play later
Play later
Lists
Like
Liked
24:37Do you always read the documentation before using a function in your languages' standard library? This talk explores the attack surface of a special feature in PHP which is easy to misuse with unforseen consequences. The `extract` function allows to replace the value of local variables named after the keys in an array. Calling it with user-controll…
…
continue reading
1
MCP security hot potato: how to stay secure integrating external tools to your LLM (god2025)
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Model Context Protocol (MCP) is the latest hot topic in cybersecurity. Business wants it (AI is the new mantra), developers are excited (new toys, new code), and security teams are left to make it safe—often with already packed schedules. Let's treat it like just another Tuesday. Like many shiny new technologies (remember the early days of cloud?),…
…
continue reading
1
Pwn My Ride: Jailbreaking Cars with CarPlay (god2025)
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Apple CarPlay is a widely known protocol that connects smartphones to car multimedia systems. Based on AirPlay, CarPlay is installed in millions of cars, as it is supported by hundreds of car models from dozens of different manufacturers across the globe. In our talk, we will share how we managed to exploit all devices running CarPlay using a singl…
…
continue reading
1
The Automation Illusion? What Machines Can't Do in Threat Modeling (god2025)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58Threat modeling stands at a critical juncture. While essential for creating secure systems, it remains mostly manual, handcrafted, and often too slow for today's development cycles. At the same time, automation and AI offer new levels of speed and scalability— but how much can we rely on them?This talk explores the tension between automation and hu…
…
continue reading
1
OWASP Cumulus: Threat Modeling the Ops of DevOps (god2025)
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08In this presentation, we will highlight how threat modeling, as a proactive measure, can increase security in DevOps projects.We will introduce OWASP Cumulus, a threat modeling card game designed for threat modeling the Ops part of DevOps processes. This game (in combination with similar games like Elevation of Privilege or OWASP Cornucopia) enable…
…
continue reading
1
Phishing for Passkeys: An Analysis of WebAuthn and CTAP (god2025)
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24WebAuthn was supposed to replace swords on the web: uniform, secure, manageable authentication for everyone! One of its unique selling points was supposed to be the impossibility of phishing attacks. When passkeys were introduced, some of WebAuthn's security principles were watered down in order to achieve some usability improvements and thus reach…
…
continue reading
1
Introducing Passkeys - Strategies and Challenges for Developers (god2025)
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18The future of authentication is passwordless - Passkeys are the key technology. This talk supports developers in implementing Passkeys in their organizations and helps with the decision between in-house development, SDK, or Passkey-as-a-Service solutions. You will learn how to design recovery flows and fallback mechanisms in a user-friendly way, ho…
…
continue reading
1
Continuous Vulnerability Scanning with OWASP secureCodeBox (god2025)
24:21
24:21
Play later
Play later
Lists
Like
Liked
24:21The OWASP secureCodeBox project aims to provide a unified way to run and automate open-source scanning tools like nmap, nuclei, zap, ssh-audit, and sslyze to continuously scan the code and infrastructure of entire organizations.This allows setting up automated scans that will regularly scan internal networks and internet-facing systems for vulnerab…
…
continue reading
Die von LangSec beschrieben grundlegenden Sicherheitsprinzipien erklären die Hauptursachen vieler Sicherheitslücken und wie man diese beheben kann. LangSec sieht die anhaltende Schwachstellen-Epidemie in Software als eine Folge der ad-hock Entwicklung von Code, der Ein- und Ausgaben verarbeitet. Gemäß LangSec besteht der Schlüssel zur Entwicklung v…
…
continue reading
1
All the WAF power to the devs - why it reduces friction… and where it backfires (god2025)
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16Web application firewalls are often seen as a hindrance when going live, as perimeter WAFs can clash with GitOps-driven platforms. Empowering development teams with an application-centric WAF setup allows them to run and tune the WAF throughout the entire development lifecycle. It also enables full integration into any CI/CD pipeline or GitOps appr…
…
continue reading
1
How the EU created Electronic Invoices without considering Security (god2025)
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51Companies within the European Union are increasingly required to be able to issue and process electronic invoices according to EU standards. For example, since January 2025, companies in Germany have been required to support electronic invoices in B2B contexts.While it is desirable to standardize invoice data formats, the EU standards have severe p…
…
continue reading
1
From Startup to Scale: Choosing the Right AppSec Path (god2025)
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17Security teams often inherit their organisation's structure - for better or worse. The way you design your AppSec programme and choose your team topology can determine whether security becomes a trusted enabler or a frustrating bottleneck.In this story-driven session, we follow Alex, who begins as the only security person in a 50-person startup. At…
…
continue reading
1
The Surprising Complexity of Finding Known Vulnerabilities (god2025)
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35With the increasing reliance on third-party software components, ensuring their security against known vulnerabilities has become a daily challenge for individuals and organizations. Despite the availability of a variety of tools and databases, we found all of them fall short when applied to real-world scenarios - raising questions about their effe…
…
continue reading
Generative AI is supposed to make our lives easier. But what if it's really just coding us straight into a new Dark Age? We hand over our systems to AI agents, only to watch them invent backdoors nobody asked for. Developers are left with the glamorous job of bug janitors, while attackers get new exploits. It's hard not to feel like we are front-ro…
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deBy OWASP German Chapter
…
continue reading
1
Why Your Code Dies in Six Months: Automated Refactoring
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58Share Episode ⸺ Episode Sponsor: Incident.io - https://dev0ps.fyi/incidentio Warren is joined by Olga Kundzich, Co-founder and CTO of Moderne, to discuss the reality of technical debt in modern software engineering. Olga reveals a shocking statistic: without maintenance, cloud-native applications often cease to function within just six months. And …
…
continue reading
Die deutsche Verkehrspolitik ist seit Jahrzehnten geprägt von einer autozentrierten Sichtweise, die gesellschaftlich tief verankert und medial normalisiert ist. Während die Wissenschaft längst auf die Grenzen dieses Modells hinweist – ökologisch, gesundheitlich, wirtschaftlich – wird die öffentliche Debatte auch hier in Lübeck oft emotional, ideolo…
…
continue reading
1
„Mein Gott, wo treiben sie uns hin?“ (nook25)
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25Die Todesmärsche aus den Konzentrationslagern im April 1945 am Beispiel des Sachsenhausener Todesmarsches. Vortrag mit Originalfotos und Zeichnungen und Zitaten der überlebenden KZ-Häftlinge. Wie erging es den gefangenen Menschen? Wie hat sich die deutsche Bevölkerung verhalten, als die Märsche in die Dörfer und Städte kamen? Die Nights of Open Kno…
…
continue reading
Neuronale Netze (DNNs) wie ChatGPT findet man dank ihrer guten Performanz inzwischen in vielerlei Bereichen, nicht nur im privaten sondern auch in ethisch relevanten Anwendungsgebieten wie medizinische Diagnostik und autonomem Fahren. Gleichzeitig werden Stimmen laut, dass die Entscheidungen von DNNs nachvollziehbar, und die genutzte KI „transparen…
…
continue reading
Wie wichtig sauberes Wasser ist, ist wohl uns allen klar. Aber was tun wir, wenn die Süßwasservorräte zur Neige gehen und es immer weniger Regenfälle gibt?„Atmospheric Water Harvesting“ (AWH) kann dem aktuellen und in Zukunft nur noch wachsenden Problem des Wassermangels etwas entgegensetzen. AWH ist die Technologie zur Wassergewinnung aus der Luft…
…
continue reading
1
Building focused learning communities (nook25)
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55Veränderung ist schwer. Gemeinsam geht es besser. Aber wie konkret?Das Format: 6–12 Menschen treffen sich ein halbes Jahr lang jede Woche für eineinhalb Stunden.Das Ziel: Eine neue Fähigkeit erlernen.Wie startet man? Wie motiviert man sich auf der Reise? Welche Tools machen das Erreichen des Ziels wahrscheinlicher? Und was sind die Stolpersteine?Di…
…
continue reading
In diesem Jahr jährt sich der Abschluss des Pariser Klimaabkommens bereits zum zehnten Mal. Fragt man nach den Auswirkungen, die die globalen Bemühungen um mehr Klimaschutz seitdem erzielt haben, fällt die Antwort niederschmetternd aus: 2024 war das erste Jahr, in dem die Oberflächentemperatur auf der Erde mehr als 1,5 °C über dem Niveau des vorind…
…
continue reading
Wir alle verwenden quelloffene Software, ob über bewusste Entscheidung oder durch Integration in gängigen Produkten. Sie erlaubt Einblicke in ihre Funktionsweise und Entwurfsmuster. Doch wer schaut sich Code näher an?Neben Programmierkenntnissen in der jeweils genutzten Sprache benötigt es Übung, sich in fremden Projekten zurechtzufinden. Projektst…
…
continue reading
Für uns in Schleswig-Holstein spielt das Meer eine besondere Rolle. Land und Leute sind stark mit Nord- und Ostsee verbunden und für viele sind sie die Existenzgrundlage, sei es durch Schifffahrt, Fischerei oder Tourismus. Darüber hinaus sind Meere und Ozeane enorm wichtig für das Klima, z. B. als Kohlenstoffspeicher. Aus unterschiedlichen Gründen …
…
continue reading
As GodotFest 25 comes to a close, we’ll wrap up the conference with final thoughts, highlights from the past two days, and thank everyone who made this event possible.We’ll celebrate the amazing talks, workshops, and connections made throughout the conference, recognize our sponsors and volunteers, and look forward to the future of the Godot commun…
…
continue reading
1
Fireside Chat – Godot’s Next Milestones (godotfest2025)
45:57
45:57
Play later
Play later
Lists
Like
Liked
45:57Godot has grown from a community passion project into a real alternative for professional studios. The 4.x series brought the technical groundwork — a modern renderer, new architecture, and steady performance improvements — that make larger productions viable. Now the next milestones aren’t just in the engine itself but in the surrounding ecosystem…
…
continue reading
1
Unlocking Godot’s Superpower: Productivity (godotfest2025)
53:10
53:10
Play later
Play later
Lists
Like
Liked
53:10While working on Dome Keeper and PVKK over the past year and a half, people often ask me what I love most about Godot. My answer is always the same: productivity. In this talk I'll discuss why Productivity is even more important for indie game development than many realize and what makes Godot so good at it IF you know how to harness it. I’ll share…
…
continue reading
1
New Game+: Adding Backend Features to Your Godot Projects (godotfest2025)
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54Ready to unlock the next level of your Godot development? Just like New Game+ adds exciting features to enhance replay value, adding backend capabilities transforms your games from single-player experiences into connected, community-driven platforms. In this talk, we'll explore how to level up your Godot projects with robust backend features like r…
…
continue reading
1
Beyond the Loop: A Primer on Interactive Music in Godot (godotfest2025)
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Unlock the **secrets of interactive music** in Godot and learn how to bridge the gap between game developers and audio creators. In this session you will discover how to use adaptive scores to transform your _gameplay_, boost the _immersion_, _replayability_, and _emotional impact_ of your project through **adaptive audio**. Covering all the _basic…
…
continue reading
Many Godot developers push mobile to the end of their roadm - if they consider it at all. The common pattern: build for desktop, ship on Steam or itch, and think about mobile later if the project takes off. In this talk, we’ll explore how and why developers should start thinking about mobile earlier in their process.Mobile represents the largest ga…
…
continue reading
1
Keeper to Keepers: Adding Multiplayer to Dome Keeper (godotfest2025)
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34The age-old wisdom for adding multiplayer to a complex single player game is: Don't.This talk will cover how we added mixed local and online multiplayer to an existing codebase of tens of thousands of lines of GDScript and how you can think about systems in your game to do the same.Licensed to the public under https://creativecommons.org/licenses/b…
…
continue reading
1
Making Audio for a Godot Project in FMOD (godotfest2025)
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52As the last of the "big 3" engines still lacking an officially-supported FMOD integration plugin, Godot offers a unique working environment for sound designers and composers utilizing FMOD. In this talk, I would like to explore the advantages and disadvantages this presented when making music and SFX as a one-man audio department for the roguelike …
…
continue reading
This talk explores the powerful capabilities and practical challenges of working with Godot’s tilemap system, drawing from real-world experience building an open world game. From optimization techniques that keep large worlds running smoothly to the underutilized Scene Tiles feature, you’ll learn how to leverage tilemaps beyond basic level design. …
…
continue reading
1
Raytracing is simple for 2D games! (godotfest2025)
50:27
50:27
Play later
Play later
Lists
Like
Liked
50:272D games often struggle to match the visual appeal of 3D games, since they can't use common lighting techniques. However, these effects can be created with quite simple shaders, and they perform much better than the 3D counterparts.In this talk, I will share the lighting techniques I have implemented for my game, Blastronaut, including the new 2D r…
…
continue reading
1
Art Direction Crash Course (for non-artists) (godotfest2025)
26:26
26:26
Play later
Play later
Lists
Like
Liked
26:26A talk aimed at non-artists that covers "how to art direct". We will cover basics like lighting, colors and shape language. But also teach how to stylize, what the difference between a moodboard and a reference board is and just general art knowledge that will be helpful for programmers, gamedesigners and leveldesigners.Licensed to the public under…
…
continue reading